
DIVA LAN ISDN Modem User’s Guide Table of Contents
5
Traffic filtering ............................................................................................. 64
Chapter Six:
Security ............................................................................................................. 65
Security features ......................................................................................... 66
System password ........................................................................................ 67
Automatic log out ........................................................................................ 67
Network address translation ...................................................................... 68
Security benefits ..................................................................................................... 68
NAT static mappings ............................................................................................... 68
Remote management .................................................................................. 70
Incoming data calls ..................................................................................... 72
Call screening ............................................................................................. 74
Call authentication ...................................................................................... 74
To set up call authentication .................................................................................... 75
Callback ....................................................................................................... 76
Callback modes ...................................................................................................... 76
Callback options ...................................................................................................... 76
Delay before host calls back ................................................................................... 77
Timeout waiting for callback .................................................................................... 77
To set up callback ................................................................................................... 77
Manual dialing ............................................................................................. 77
Custom security features ........................................................................... 78
Chapter Seven:
Setting up the Phone Ports ............................................................................. 79
Assigning phone numbers ......................................................................... 80
Single number ......................................................................................................... 80
Multiple numbers ..................................................................................................... 80
Assigning phone numbers using the Phone Line Wizard ....................................... 81
Assigning phone numbers manually ....................................................................... 81
Configuring phone numbers for data calls .............................................................. 82
Connecting modems and fax machines ................................................... 83
Connecting multiple analog devices ......................................................... 83
Call bumping ............................................................................................... 84
How it works ............................................................................................................ 84
Requirements ......................................................................................................... 84
To enable call bumping ........................................................................................... 84
Restricting analog calls .............................................................................. 85
Supplementary services ............................................................................. 86
Call Hold ................................................................................................................. 87
Call Waiting ............................................................................................................. 87
Calling Line Identity on Call Waiting ....................................................................... 89
Calling Line Identity Presentation ........................................................................... 89
Calling Line Identity Restriction (CLIR) ................................................................... 89
Call Forwarding ....................................................................................................... 90
Malicious Caller Identification ................................................................................. 91
Call redirection between analog ports .................................................................... 91
Three-party Conference Call .................................................................................. 91
Komentarze do niniejszej Instrukcji